Volume 27,Issue 6,2016 Table of Contents
云计算安全研究专刊前言薛锐,任奎,张玉清,李晖,刘吉强,赵波,祝烈煌2016,27(6):1325-1327 [Abstract(6003)] [View PDF(7429)256.49 K]Survey on Cloud Computing SecurityZHANG Yu-Qing, WANG Xiao-Fei, LIU Xue-Feng and LIU Ling2016,27(6):1328-1348 [Abstract(8608)] [View PDF(14373)816.86 K]Model Constructing Method for Analyzing the Trusty of CloudZHAO Bo, DAI Zhong-Hua, XIANG Shuang and TAO Wei2016,27(6):1349-1365 [Abstract(5502)] [View PDF(7789)839.78 K]Secure Access Scheme of Cloud Services for Trusted Mobile Terminals using TrustZoneYANG Bo, FENG Deng-Guo, QIN Yu and ZHANG Ying-Jun2016,27(6):1366-1383 [Abstract(5859)] [View PDF(9915)854.90 K]Research and Application Progress of Virtual Machine Introspection TechnologyLI Bao-Hui, XU Ke-Fu, ZHANG Peng, GUO Li, HU Yue and FANG Bin-Xing2016,27(6):1384-1401 [Abstract(6142)] [View PDF(11611)513.10 K]Security Protection Model on Live Migration for KVM VirtualizationFAN Wei, KONG Bin, ZHANG Zhu-Jun, WANG Ting-Ting, ZHANG Jie and HUANG Wei-Qing2016,27(6):1402-1416 [Abstract(5811)] [View PDF(8491)804.55 K]Group Provable Data Possession with Deduplication in Cloud StorageWANG Hong-Yuan, ZHU Lie-Huang and LI Long-Yi-Jia2016,27(6):1417-1431 [Abstract(5145)] [View PDF(7366)555.81 K]Enforcing Access Controls on Encrypted Cloud Storage with Policy HidingLEI Lei, CAI Quan-Wei, JING Ji-Wu, LIN Jing-Qiang, WANG Zhan and CHEN Bo2016,27(6):1432-1450 [Abstract(6634)] [View PDF(8390)674.52 K]Cloud Storage Integrity Checking Scheme with Private Key Recovery CapabilitySHEN Wen-Ting, YU Jia, YANG Guang-Yang, CHENG Xiang-Guo and HAO Rong2016,27(6):1451-1462 [Abstract(5251)] [View PDF(6965)812.42 K]Secure Cloud Storage Model Based on Threshold Public Key Encryption and Erasure Codes over ExponentsXU Jian, LI Jian, HAN Jian, LI Fu-Xiang and ZHOU Fu-Cai2016,27(6):1463-1474 [Abstract(4983)] [View PDF(7131)1.30 M]Multi-User Binary Tree Based ORAM SchemeSUN Xiao-Ni, JIANG Han and XU Qiu-Liang2016,27(6):1475-1486 [Abstract(5677)] [View PDF(6959)420.63 K]Identity-Based Fully Homomorphic Encryption from EigenvectorKANG Yuan-Ji, GU Chun-Xiang, ZHENG Yong-Hui and GUANG Yan2016,27(6):1487-1497 [Abstract(5854)] [View PDF(8433)371.92 K]Key-Policy Attribute-Based Encryption Scheme for General CircuitsHU Peng and GAO Hai-Ying2016,27(6):1498-1510 [Abstract(4684)] [View PDF(6505)522.13 K]Privacy-Preserving Multi-Factor Key Exchange Protocol in the Standard ModelWEI Fu-Shan, ZHANG Gang, MA Jian-Feng and MA Chuan-Gui2016,27(6):1511-1522 [Abstract(4924)] [View PDF(6991)445.30 K]ID Authentication Scheme Based on PTPM and Certificateless Public Key Cryptography in Cloud EnvironmentWANG Zhong-Hua, HAN Zhen, LIU Ji-Qiang, ZHANG Da-Wei and CHANG Liang2016,27(6):1523-1537 [Abstract(5390)] [View PDF(7199)1.04 M]Trusted Cloud Tenant Separation Mechanism Supporting TransparencySHI Yong, GUO Yu, LIU Ji-Qiang, HAN Zhen, MA Wei and CHANG Liang2016,27(6):1538-1548 [Abstract(5288)] [View PDF(6754)382.98 K]Secure Set Computing in Cloud EnvironmentLI Shun-Dong, ZHOU Su-Fang, GUO Yi-Min, DOU Jia-Wei and WANG Dao-Shun2016,27(6):1549-1565 [Abstract(5713)] [View PDF(7599)421.54 K]Efficient Ciphertext Search Method Based on Similarity Search TreeTIAN Xue, ZHU Xiao-Jie, SHEN Pei-Song, CHEN Chi and ZOU Hong2016,27(6):1566-1576 [Abstract(5482)] [View PDF(7829)473.04 K]Efficient Conjunctive Keyword Search over Encrypted Electronic Medical RecordsZHANG Li-Li, ZHANG Yu-Qing, LIU Xue-Feng and QUAN Han-Yu2016,27(6):1577-1591 [Abstract(5516)] [View PDF(7273)499.12 K]Reversible Data Hiding in Encrypted Image Based on Homomorphic Public Key CryptosystemXIANG Shi-Jun and LUO Xin-Rong2016,27(6):1592-1601 [Abstract(6243)] [View PDF(7579)569.70 K]